Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 13:37

General

  • Target

    224e8b219e855f118375d487e6ac15f0.exe

  • Size

    252KB

  • MD5

    224e8b219e855f118375d487e6ac15f0

  • SHA1

    02397f0e277508ce202d7f90b325c4ed7298eeb4

  • SHA256

    80d0de1de27f659bdc31d0aab393837167b348ff4029e354be394fb2b79ba371

  • SHA512

    c03b4714973936f93032e6cf5b50b12637c9a9d562221b9887b4f34c717ee03e49824dc1a2fe33d7b03c495255ab7ccb05c623807680230e8534d3cf6f1c7d4f

  • SSDEEP

    3072:nI7+8kQQHL+ueDVpsXMpI9B0p3DvsR2P4COdP0V9y40z4Ekz1eaMjAmectmqy3hb:4+8MHMt+9B0lvq2P4Lm9y1k1z1eRbpd

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/869635461541429258/hxEYazB2m_bqWOWdlnRrBOnLi8waabSchbnYiXPHDudSBlAEOry51hz3i902VgDh1LGm

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\224e8b219e855f118375d487e6ac15f0.exe
    "C:\Users\Admin\AppData\Local\Temp\224e8b219e855f118375d487e6ac15f0.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    1KB

    MD5

    6d3179ed9e118fbce4094a33ad9c854a

    SHA1

    d7ab74e2ca9a899d718a3ec568227b51f51ce79b

    SHA256

    c09f97fd844a6b68fed80fc8b765c5566972f96e4dffa8c8c42452b403d4cea3

    SHA512

    d19ab3abcc5f91098445a6c7e1fd45f5f544fbd4ea362985d1695d75f812d5b1743111fb42b4ddc1bb2215694c5a82a063a2db0d1afa1c529786558cadb384bb

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    1KB

    MD5

    26e2e60301547f9f8e5b4284e098e1f3

    SHA1

    2aad8c38bffcade3e466cc1479e97e6728d9b424

    SHA256

    1d79363af59cf06ca392bdea9b5bfe1f62461fd58b64e9a300e1d59631d444fa

    SHA512

    1b4276bd0de9d012758e88c661f2d8143108401e8d6efcdd6a36bc69b0d1d199bee11dc339573f1fbffac34c4ad5462173903ac02b21e27958495076b17a8e2a

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    741B

    MD5

    cb3d83c94d95db14f30f1f97f9c884a6

    SHA1

    399f195d80dcc3e9c2cd64fdc7b3a3492ce23e35

    SHA256

    7153ce2627be066fe41d2da744ddcc7c155b944e797cd0b74ab0acd378786326

    SHA512

    1c4b3c16a6134f55be2aa578a612972889ff33631e5e87ea23662f475994a55d7b99e838de3d13a9db460d9fdfee3e6c255b536a5808255481174189583d91f6

  • memory/2292-0-0x00000000008B0000-0x00000000008F6000-memory.dmp

    Filesize

    280KB

  • memory/2292-18-0x00007FFB946C0000-0x00007FFB95181000-memory.dmp

    Filesize

    10.8MB

  • memory/2292-32-0x000000001B530000-0x000000001B540000-memory.dmp

    Filesize

    64KB

  • memory/2292-124-0x00007FFB946C0000-0x00007FFB95181000-memory.dmp

    Filesize

    10.8MB